Intrusion detection systems and multisensor data fusion
Communications of the ACM
A Testbed for Quantitative Assessment of Intrusion Detection Systems using Fuzzy Logic
IWIA '04 Proceedings of the Second IEEE International Information Assurance Workshop (IWIA'04)
BPEL orchestration of secure webmail
Proceedings of the 3rd ACM workshop on Secure web services
An intelligent method to block e-mail bombs
Applied Intelligence
SIPS: a stateful and flow-based intrusion prevention system for email applications
NPC'07 Proceedings of the 2007 IFIP international conference on Network and parallel computing
Hi-index | 0.02 |
The simplicity of SMTP mail can be combined with the robustness of the sendmail MTA program and misused in numerous ways to create extraordinary and powerful e-mail bombs. These e-mail bombs can be launched in many different attack scenarios which can easily flood and shut down chains of SMTP mail servers. Sendmail-based SMTP mail relays also can be used covertly to distribute messages and files that could be very damaging to the integrity and brands of victims. This article discusses mail-bombing techniques, automated attack tools, and countermeasures. Also discussed is an actual Internet-based attack that was launched in 1997 on the Langley AFB SMTP e-mail infrastructure. The authors also present an analysis of the cyber attack, graphs illustrating the attack volume, and a statistical e-mail bomb early warning system